SlideShare a Scribd company logo
1 of 22
” We believe in the safe journey for all to the clouds!” Artwork: Anders Brännfors, Cortego
The board
Daniel Akenine, IASA & Microsoft
Ulf Berglund, ISecU2
Anders Brännfors, Cortego
Inger Gran, The Swedish  Computer Society
Per Hägerö, PortWise
John Lindström, Luleå Tekniska Universitet
Göran Lustig, Cortego
Predrag Mitrovic, MyNethouse
Cecilia Magnusson Sjöberg, Stockholms Universitet
Jesper Tohmo, Nordic Edge
Eliza Roszkowska Öberg, Member of  Parliament (M)
BUSINESSES, ORGANISATIONS & CITIZENS Demand generation TECH. PROVIDERS
 
YOU MICROBLOGS BLOGS SOCIAL MEDIA IRL [email_address] TASKFORCE SEC/LAW INFRA-STRUCTURE CHECK-LIST CONVERSATION CONVERSATION CONVERSATION CONVERSATION IASA,NIST, CSA, SIS, EU,  Eurocloud AND OTHERS
Program statement
What we do? ,[object Object]
Why we do it? ,[object Object]
For who are we doing it? ,[object Object]
Why are we doing it? ,[object Object]
 

More Related Content

What's hot

IoT security reference architecture
IoT security  reference architectureIoT security  reference architecture
IoT security reference architectureElias Hasnat
 
SmartSecuritySolution_for_IoT
SmartSecuritySolution_for_IoTSmartSecuritySolution_for_IoT
SmartSecuritySolution_for_IoTShiven Chawla
 
TUW-ASE Summer 2015: IoT Cloud Systems
TUW-ASE Summer 2015:  IoT Cloud SystemsTUW-ASE Summer 2015:  IoT Cloud Systems
TUW-ASE Summer 2015: IoT Cloud SystemsHong-Linh Truong
 
The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)Saurabh Yadav
 
Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot IoT Tunisia
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014Bessie Wang
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...IEEEFINALSEMSTUDENTPROJECTS
 
Secured(ing) IoT infrastructure for smart cities of Nepal
Secured(ing) IoT infrastructure for smart cities of NepalSecured(ing) IoT infrastructure for smart cities of Nepal
Secured(ing) IoT infrastructure for smart cities of NepalRabiraj Khadka
 
Why we need IoT
Why we need IoTWhy we need IoT
Why we need IoTOleg Popov
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principlesardexateam
 
SFScon 21 - Nicola Altamura - Implementation of IOTA solutions on embedded de...
SFScon 21 - Nicola Altamura - Implementation of IOTA solutions on embedded de...SFScon 21 - Nicola Altamura - Implementation of IOTA solutions on embedded de...
SFScon 21 - Nicola Altamura - Implementation of IOTA solutions on embedded de...South Tyrol Free Software Conference
 
Mainflux - Hyperscalable Unified IoT Platform
Mainflux - Hyperscalable Unified IoT PlatformMainflux - Hyperscalable Unified IoT Platform
Mainflux - Hyperscalable Unified IoT PlatformSasa Klopanovic
 
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSTHE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSsuthi
 
2nd International Conference on Networks & IOT (NeTIOT 2021)
2nd International Conference on Networks & IOT (NeTIOT 2021)2nd International Conference on Networks & IOT (NeTIOT 2021)
2nd International Conference on Networks & IOT (NeTIOT 2021)pijans
 
Slideshared 27-3-2015- iucee- iot- webinar
Slideshared 27-3-2015- iucee- iot- webinarSlideshared 27-3-2015- iucee- iot- webinar
Slideshared 27-3-2015- iucee- iot- webinarRavindra Dastikop
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Inria | White paper Internet of Things (November 2021)
Inria | White paper Internet of Things (November 2021)Inria | White paper Internet of Things (November 2021)
Inria | White paper Internet of Things (November 2021)Inria
 

What's hot (20)

IoT security reference architecture
IoT security  reference architectureIoT security  reference architecture
IoT security reference architecture
 
SmartSecuritySolution_for_IoT
SmartSecuritySolution_for_IoTSmartSecuritySolution_for_IoT
SmartSecuritySolution_for_IoT
 
TUW-ASE Summer 2015: IoT Cloud Systems
TUW-ASE Summer 2015:  IoT Cloud SystemsTUW-ASE Summer 2015:  IoT Cloud Systems
TUW-ASE Summer 2015: IoT Cloud Systems
 
The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)
 
Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot
 
MST
MSTMST
MST
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
 
Secured(ing) IoT infrastructure for smart cities of Nepal
Secured(ing) IoT infrastructure for smart cities of NepalSecured(ing) IoT infrastructure for smart cities of Nepal
Secured(ing) IoT infrastructure for smart cities of Nepal
 
Why we need IoT
Why we need IoTWhy we need IoT
Why we need IoT
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
 
SFScon 21 - Nicola Altamura - Implementation of IOTA solutions on embedded de...
SFScon 21 - Nicola Altamura - Implementation of IOTA solutions on embedded de...SFScon 21 - Nicola Altamura - Implementation of IOTA solutions on embedded de...
SFScon 21 - Nicola Altamura - Implementation of IOTA solutions on embedded de...
 
Mainflux - Hyperscalable Unified IoT Platform
Mainflux - Hyperscalable Unified IoT PlatformMainflux - Hyperscalable Unified IoT Platform
Mainflux - Hyperscalable Unified IoT Platform
 
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSTHE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
 
2nd International Conference on Networks & IOT (NeTIOT 2021)
2nd International Conference on Networks & IOT (NeTIOT 2021)2nd International Conference on Networks & IOT (NeTIOT 2021)
2nd International Conference on Networks & IOT (NeTIOT 2021)
 
Slideshared 27-3-2015- iucee- iot- webinar
Slideshared 27-3-2015- iucee- iot- webinarSlideshared 27-3-2015- iucee- iot- webinar
Slideshared 27-3-2015- iucee- iot- webinar
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Ai dan big data
Ai dan big dataAi dan big data
Ai dan big data
 
Ethical issues in internet of things
Ethical issues in internet of thingsEthical issues in internet of things
Ethical issues in internet of things
 
Inria | White paper Internet of Things (November 2021)
Inria | White paper Internet of Things (November 2021)Inria | White paper Internet of Things (November 2021)
Inria | White paper Internet of Things (November 2021)
 

Similar to Cloud Sweden Charter English

SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016Dale Butler
 
Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016Ericsson
 
Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation baipgroup
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
 
Eurodocs faxepark horizon 2020 presentation 2014 11-13
Eurodocs faxepark horizon 2020 presentation 2014 11-13Eurodocs faxepark horizon 2020 presentation 2014 11-13
Eurodocs faxepark horizon 2020 presentation 2014 11-13Eurodocs AB
 
Security and Privacy in Fog Computing for the Internet of Things using Dynami...
Security and Privacy in Fog Computing for the Internet of Things using Dynami...Security and Privacy in Fog Computing for the Internet of Things using Dynami...
Security and Privacy in Fog Computing for the Internet of Things using Dynami...BRNSSPublicationHubI
 
Bild 1
Bild 1Bild 1
Bild 1butest
 
Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfacijjournal
 
Nordic IT Security Forum 2015 Agenda
Nordic IT Security Forum 2015 AgendaNordic IT Security Forum 2015 Agenda
Nordic IT Security Forum 2015 AgendaCopperberg
 
SECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURES
SECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURESSECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURES
SECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURESIAEME Publication
 
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol IJECEIAES
 
Different applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin AkadDifferent applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin AkadJatin Akar
 
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...BRNSSPublicationHubI
 
Data Portability & Application Portability - Cloud Security Expo 2017
Data Portability & Application Portability - Cloud Security Expo 2017Data Portability & Application Portability - Cloud Security Expo 2017
Data Portability & Application Portability - Cloud Security Expo 2017CloudWATCH Consortium
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...IJNSA Journal
 
Membuka kunci digital ekonomi di Indonesia
Membuka kunci digital ekonomi di IndonesiaMembuka kunci digital ekonomi di Indonesia
Membuka kunci digital ekonomi di IndonesiaWidy Widyawan
 

Similar to Cloud Sweden Charter English (20)

SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016
 
Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016
 
Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
 
Eurodocs faxepark horizon 2020 presentation 2014 11-13
Eurodocs faxepark horizon 2020 presentation 2014 11-13Eurodocs faxepark horizon 2020 presentation 2014 11-13
Eurodocs faxepark horizon 2020 presentation 2014 11-13
 
Security and Privacy in Fog Computing for the Internet of Things using Dynami...
Security and Privacy in Fog Computing for the Internet of Things using Dynami...Security and Privacy in Fog Computing for the Internet of Things using Dynami...
Security and Privacy in Fog Computing for the Internet of Things using Dynami...
 
Bild 1
Bild 1Bild 1
Bild 1
 
Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdf
 
Nordic IT Security Forum 2015 Agenda
Nordic IT Security Forum 2015 AgendaNordic IT Security Forum 2015 Agenda
Nordic IT Security Forum 2015 Agenda
 
SECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURES
SECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURESSECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURES
SECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURES
 
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol
 
Different applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin AkadDifferent applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin Akad
 
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
 
Data Portability & Application Portability - Cloud Security Expo 2017
Data Portability & Application Portability - Cloud Security Expo 2017Data Portability & Application Portability - Cloud Security Expo 2017
Data Portability & Application Portability - Cloud Security Expo 2017
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its Applications
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its Applications
 
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
 
Membuka kunci digital ekonomi di Indonesia
Membuka kunci digital ekonomi di IndonesiaMembuka kunci digital ekonomi di Indonesia
Membuka kunci digital ekonomi di Indonesia
 
OPTICAL FIBERS.pdf
OPTICAL FIBERS.pdfOPTICAL FIBERS.pdf
OPTICAL FIBERS.pdf
 

More from Predrag Mitrovic

Personlig vision och skapande
Personlig vision och skapandePersonlig vision och skapande
Personlig vision och skapandePredrag Mitrovic
 
Strategi, kompetens och utveckling
Strategi, kompetens och utvecklingStrategi, kompetens och utveckling
Strategi, kompetens och utvecklingPredrag Mitrovic
 
Identiteter nordic edge april 2011
Identiteter nordic edge april 2011Identiteter nordic edge april 2011
Identiteter nordic edge april 2011Predrag Mitrovic
 
Agility computing itarc2011
Agility computing itarc2011Agility computing itarc2011
Agility computing itarc2011Predrag Mitrovic
 
Agility computing itarc2011
Agility computing itarc2011Agility computing itarc2011
Agility computing itarc2011Predrag Mitrovic
 
Sig security fokusdag 2011 CIO & Molnsäkerhet
Sig security fokusdag 2011 CIO & MolnsäkerhetSig security fokusdag 2011 CIO & Molnsäkerhet
Sig security fokusdag 2011 CIO & MolnsäkerhetPredrag Mitrovic
 
Cloudsweden Powerpointmall PPT loggan till höger
Cloudsweden Powerpointmall PPT loggan till högerCloudsweden Powerpointmall PPT loggan till höger
Cloudsweden Powerpointmall PPT loggan till högerPredrag Mitrovic
 
Cloudsweden Powerpointmall PPTX loggan till höger
Cloudsweden Powerpointmall PPTX loggan till högerCloudsweden Powerpointmall PPTX loggan till höger
Cloudsweden Powerpointmall PPTX loggan till högerPredrag Mitrovic
 
Cloud sweden Powerpointmall PPTX
Cloud sweden Powerpointmall PPTXCloud sweden Powerpointmall PPTX
Cloud sweden Powerpointmall PPTXPredrag Mitrovic
 
Cloud sweden Powerpointmall PPT
Cloud sweden Powerpointmall PPTCloud sweden Powerpointmall PPT
Cloud sweden Powerpointmall PPTPredrag Mitrovic
 
Cloud sweden Powerpointmall pptx-format
Cloud sweden Powerpointmall pptx-formatCloud sweden Powerpointmall pptx-format
Cloud sweden Powerpointmall pptx-formatPredrag Mitrovic
 
Dokumenthantering i molnet
Dokumenthantering i molnetDokumenthantering i molnet
Dokumenthantering i molnetPredrag Mitrovic
 
Cloud strategy briefing 101
Cloud strategy briefing 101 Cloud strategy briefing 101
Cloud strategy briefing 101 Predrag Mitrovic
 
Dfs Ws Sociala Medier 2009
Dfs Ws Sociala Medier 2009Dfs Ws Sociala Medier 2009
Dfs Ws Sociala Medier 2009Predrag Mitrovic
 
Portwise 2009 Presentation om Cloud & Security
Portwise 2009 Presentation om Cloud & SecurityPortwise 2009 Presentation om Cloud & Security
Portwise 2009 Presentation om Cloud & SecurityPredrag Mitrovic
 

More from Predrag Mitrovic (20)

Nygammalt om molnlöftet
Nygammalt om molnlöftetNygammalt om molnlöftet
Nygammalt om molnlöftet
 
Personlig vision och skapande
Personlig vision och skapandePersonlig vision och skapande
Personlig vision och skapande
 
Strategi, kompetens och utveckling
Strategi, kompetens och utvecklingStrategi, kompetens och utveckling
Strategi, kompetens och utveckling
 
Information om e-grannar
Information om e-grannarInformation om e-grannar
Information om e-grannar
 
Identiteter nordic edge april 2011
Identiteter nordic edge april 2011Identiteter nordic edge april 2011
Identiteter nordic edge april 2011
 
Agility computing itarc2011
Agility computing itarc2011Agility computing itarc2011
Agility computing itarc2011
 
Agility computing itarc2011
Agility computing itarc2011Agility computing itarc2011
Agility computing itarc2011
 
Sig security fokusdag 2011 CIO & Molnsäkerhet
Sig security fokusdag 2011 CIO & MolnsäkerhetSig security fokusdag 2011 CIO & Molnsäkerhet
Sig security fokusdag 2011 CIO & Molnsäkerhet
 
Cloudsweden Powerpointmall PPT loggan till höger
Cloudsweden Powerpointmall PPT loggan till högerCloudsweden Powerpointmall PPT loggan till höger
Cloudsweden Powerpointmall PPT loggan till höger
 
Cloudsweden Powerpointmall PPTX loggan till höger
Cloudsweden Powerpointmall PPTX loggan till högerCloudsweden Powerpointmall PPTX loggan till höger
Cloudsweden Powerpointmall PPTX loggan till höger
 
Cloud sweden Powerpointmall PPTX
Cloud sweden Powerpointmall PPTXCloud sweden Powerpointmall PPTX
Cloud sweden Powerpointmall PPTX
 
Cloud sweden Powerpointmall PPT
Cloud sweden Powerpointmall PPTCloud sweden Powerpointmall PPT
Cloud sweden Powerpointmall PPT
 
Cloud sweden Powerpointmall pptx-format
Cloud sweden Powerpointmall pptx-formatCloud sweden Powerpointmall pptx-format
Cloud sweden Powerpointmall pptx-format
 
Dokumenthantering i molnet
Dokumenthantering i molnetDokumenthantering i molnet
Dokumenthantering i molnet
 
Cloud strategy briefing 101
Cloud strategy briefing 101 Cloud strategy briefing 101
Cloud strategy briefing 101
 
Predrag cv short english
Predrag cv short englishPredrag cv short english
Predrag cv short english
 
Cloud Sweden Kick-off
Cloud Sweden Kick-offCloud Sweden Kick-off
Cloud Sweden Kick-off
 
Cloud Sweden Kick-Off
Cloud Sweden Kick-OffCloud Sweden Kick-Off
Cloud Sweden Kick-Off
 
Dfs Ws Sociala Medier 2009
Dfs Ws Sociala Medier 2009Dfs Ws Sociala Medier 2009
Dfs Ws Sociala Medier 2009
 
Portwise 2009 Presentation om Cloud & Security
Portwise 2009 Presentation om Cloud & SecurityPortwise 2009 Presentation om Cloud & Security
Portwise 2009 Presentation om Cloud & Security
 

Cloud Sweden Charter English

Editor's Notes

  1. Konsekvens i färger! Fixa fram loggan med Creative Commons 2.5 erkännande dela lika